1. Give a detailed account of why the three-way handshake is a security threat.
2. In the chapter, we gave two examples of how a port scan can be a threat to security. Give three more examples of port scans that can lead to system security compromise.
3. Comment on the rapid growth of the Internet as a contributing factor to the security threat of cyberspace. What is the responsible factor in this growth? Is it people or the number of computers?